Slashdot videos: Now with more Slashdot!

View

Discuss

Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

Michael Ross writes As with any content management system, building a website using Drupal typically requires extensive use of its administrative interface, as one navigates through its menus, fills out its forms, and reads the admin pages and notifications — or barely skims them, as they have likely been seen by the site builder countless times before. With the aim of avoiding this tedium, speeding up the process, and making it more programmatic, members of the Drupal community created a "shell" program, Drush, which allows one to perform most of these tasks on the command line. At this time, there is only one current print book that covers this tool, Drush for Developers, Second Edition, which is ostensibly an update of its predecessor, Drush User's Guide. Read below for the rest of Michael's review.

jfruh writes In theory, the European Union is supposed to act as a single national market. But one area in which practice doesn't live up to theory is geoblocking: Europeans may find that a website they can reach or content they have a legal right to stream in one EU country is blocked in another. Now two members of the EU Commission (the equivalent of a nation's cabinet) are feuding as to whether geoblocks should be eliminated: Commission Vice-President for the Digital Single Market Andrus Ansip said that "deep in my heart ... I hate geoblocking," while Commissioner for Digital Economy and Society Günther Oettinger, worrying about protecting the European film industry, said "We must not throw the baby out with the bathwater."

benrothke writes Technology is neutral and amoral. It's the implementers and users who define its use. In Future Crimes: Everything Is Connected, Everyone Is Vulnerable and What We Can Do About It, author Marc Goodman spends nearly 400 pages describing the dark side of technology, and those who use it for nefarious purposes. He provides a fascinating overview of how every major technology can be used to benefit society, and how it can also be exploited by those on the other side. Keep reading for the rest of Ben's review.

An anonymous reader writes While various states in the U.S. (most notably: New York) are trying to regulate every last aspect of Bitcoin, making it very difficult to innovate there, the UK appears to be going in the opposite direction. It's been setting up much more open regulations that would allow for greater freedom for Bitcoin startups to innovate without first having to ask for permission. In fact, the British government decided that what is most appropriate is to work with the digital currency community to develop a set of best practices for consumer protection and create a voluntary, opt-in regime. Hopefully other governments take note.

An anonymous reader writes A new initiative from the European Commission proposes a reformed "single digital market", addressing a number of issues that it sees as obstructions to EU growth, including geoblocking — where services such as BBC's iPlayer are only available to IP addresses within the host country — and the high cost of parcel delivery and administration of disparate VAT rates across the member states. The ramifications of many of the proposals within the Digital Single Market project extend to non-EU corporations which have built their business model on the current isolationism of member state markets.

Trailrunner7 writes: Google security engineers, investigating fraudulent certificates issued for several of the company's domains, discovered that a Chinese certificate authority was using an intermediate CA, MCS Holdings, that issued the unauthorized Google certificates, and could have issued certificates for virtually any domain. Google's engineers were able to block the fraudulent certificates in the company's Chrome browser by pushing an update to the CRLset, which tracks revoked certificates. The company also alerted other browser vendors to the problem, which was discovered on March 20. Google contacted officials at CNNIC, the Chinese registrar who authorized the intermediate CA, and the officials said that they were working with MCS to issue certificates for domains that it registered. But, instead of simply doing that, and storing the private key for the registrar in a hardware security module, MCS put the key in a proxy device designed to intercept secure traffic.

An anonymous reader writes There has always been a demand for semantically enriched content, even long before the digital era. Take a look at the New York Times Index, which has been continuously published since 1913. Nowadays, technology can meet the high demands for "clever" content, and big publishers like the BBC and the NY Times are opening their data and also making a good use of it.

In this post, the author argues that Semantic Publishing is the future and talks about articles enriched with relevant facts and infoboxes with related content. Yet his example dates back to 2010, and today arguably every news website suggests related articles and provides links to external sources. This raises several questions: Why is there not much noise on this topic lately? Does this mean that we are already in the future of Online (Semantic) Publishing? Do we have all the tools now (e.g. Linked Data, fast NoSQL/Graph/RDF datastores, etc.) and what remains to be done is simply refinement and evolution? What is the difference in "cleverness" of content from different providers?

First time accepted submitter Orange Roughy writes New Zealand customs are seeking powers to obtain passwords and encryption keys for travelers. Supposedly they will only act to obtain credentials if it was acting on 'some intelligence or observation of abnormal behaviour.' People who refuse to hand over credentials could face up to three months jail time. From the story: "Customs boss Carolyn Tremain has told MPs the department would only request travellers hand over passwords to their electronic devices if it had a reason to be suspicious about what was on them. The department unleashed a furore last week when it said in a discussion paper that it should be given unrestricted power to force people to divulge passwords to their smartphones and computers at the border. That would be without Customs officials having to show they had any grounds for suspicion."

An anonymous reader writes "I've decided it's time for me to build a separate machine specifically for use as a Media Center/Small Home Server. My wife and I haven't had cable TV in years, instead relying entirely on Netflix, other streaming sites, and hard copies we've bought over the years. Having just finished ripping our entire media collection (CDs, DVDs, and even our vinyls and VHS with the help of a capture card and some sweet digital voodoo) to a couple HDDs, I'm feeling froggy. Up until now we've been using WDTV Live, and it's been pretty snazzy, but I want to upgrade to a dedicated media machine instead of piggybacking off of my office computer. It'll be a Windows based machine utilizing Plex, and it's going in the crawlspace of the house. The crawlspace in question is unfinished, but I do have a dry concrete slab down there where I can put/mount/assemble something. Cooling won't be an issue obviously, and I am keeping a close eye on hardware specs with regards to moisture. It is still a crawlspace though. What would be a good setup to to house the hardware? Priorities being to safeguard against moisture, vermin, and dirt. Modified PC Tower? Rack? Build an enclosure? Something I haven't considered?

Please assume I'm stubborn and absolutely dead-set on putting it in the crawlspace to avoid the discussion devolving into the 'best' place to put a media machine."

jones_supa writes Microsoft has issued a warning that a fraudulent SSL digital certificate has been issued in the name of a Finnish version of its Windows Live service. Although the company says it has revoked the certificate, security experts warn that older software may continue to "trust" the known bad certificate for months or even years, and that attackers could use it to trick users into running malware. "Microsoft is aware of an improperly issued SSL certificate for the domain 'live.fi' that could be used in attempts to spoof content, perform phishing attacks or perform man-in-the-middle attacks," Microsoft says in a March 16 security alert. "It cannot be used to issue other certificates, impersonate other domains or sign code. This issue affects all supported releases of Microsoft Windows. Microsoft is not currently aware of attacks related to this issue."

v3rgEz writes: The NY Times looks at how local police are fighting to keep their use of cell phone surveillance secret, including signing NDAs with Stingray manufacturer Harris Corp and claiming the documents have been lost. It's part of a broader trend of local agencies adopting the tactics of covert intelligence groups as they seek to adopt new technology in the digital era. "The nondisclosure agreements for the cell site simulators are overseen by the Federal Bureau of Investigation and typically involve the Harris Corporation, a multibillion-dollar defense contractor and a maker of the technology. What has opponents particularly concerned about StingRay is that the technology, unlike other phone surveillance methods, can also scan all the cellphones in the area where it is being used, not just the target phone. ... For instance, in Tucson, a journalist asking the Police Department about its StingRay use was given a copy of a nondisclosure agreement. 'The City of Tucson shall not discuss, publish, release or disclose any information pertaining to the product,' it read, and then noted: 'Without the prior written consent of Harris.'"

wabrandsma writes According to DutchNews.nl: "Internet providers no longer have to keep their clients phone, internet and email details because privacy is more important, a Dutch court ruled on Wednesday." Digital rights organization Bits of Freedom writes in a blog: "The law's underlying European directive was meant as a tool in the fight against serious crimes. The Dutch law, however, is much more expansive, including everything from terrorism to bike theft. During the hearing, the state's attorneys avowed that the Public Prosecution does not take the law lightly, and would not call on the law to request data in case of a bicycle theft. The judge's response: it doesn't matter if you exploit the possibility or not, the fact that the possibility exists is already reason enough to conclude that the current safeguards are unsatisfactory."

schwit1 writes Fake versions of the Apple Watch can be bought for as little as £25 — despite the fact the real thing will set you back more than 10 times that. The flagship new product was only launched in San Francisco yesterday but knock-offs are already available in China. According to CNN Money, they can be found at Huaqiangbei electronics market in the southern city of Shenzhen, and others are being sold nationwide via popular e-commerce websites. Right down to the digital crown, the fakes mimic the design and style of Apple's new offering.

jrepin writes Free software is a matter of freedom, not price; broadly speaking, it means that users are free to use the software and to copy and redistribute the software, with or without changes. Applying the same concept directly to hardware, free hardware means hardware that you are free to use and to copy and redistribute with or without changes. But, since there are no copiers for hardware, is the concept of free hardware even possible? The concept we really need is that of a free hardware design. That's simple: it means a design that permits users to use the design (i.e., fabricate hardware from it) and to copy and redistribute it, with or without changes. The design must provide the same four freedoms that define free software. Then "free hardware" means hardware with an available free design.

An anonymous reader writes: Minecraft is known for a lot of things. It's a fantastic creative outlet and the digital sandbox of youngsters' dreams, for instance. The game has also been known to raise the ire of unrelated companies who somehow think all that creativity by gamers is something that can be sued over. It's known for amazing user-generated content, including games within games and replicas of entire cities. The nation of Turkey is known for very different things. It's a country that absolutely loves to censor stuff, for instance. And, thanks to recent developments, Turkey is also known as a great place to get a front-row look at the incredible violence done by the Islamic State in Syria and Iraq. But the Turkish government has a plan to keep its youngsters from witnessing too much violence: it is calling to ban Minecraft.

astroengine writes: A ring-like filament of stars wrapping around the Milky Way may actually belong to the galaxy itself, rippling above and below the relatively flat galactic plane. If so, that would expand the size of the known galaxy by 50 percent and raise intriguing questions about what caused the waves of stars. Scientists used data collected by the Sloan Digital Sky Survey to reanalyze the brightness and distance of stars at the edge of the galaxy. They found that the fringe of the disk is puckered into ridges and grooves of stars, like corrugated cardboard. "It looks to me like maybe these patterns are following the spiral structure of the Milky Way, so they may be related," said astronomer Heidi Newberg.
In other Milky Way new, a Cambridge team has found nine new dwarf satellites orbiting our galaxy. Some of them are definitely dwarf galaxies, and the others may be the same, or globular clusters.

New submitter dwywit, anticipating World Backup Day, writes I've been asked to film this year's ANZAC services in my town. This is a big one, as it's the centenary of the Gallipoli campaign, and dear to our hearts here in Oz. The organisers have asked me to provide a camera-to-projector setup for remote viewing (they're expecting big crowds this year), and a recording of the parade and various services throughout the morning. Copies will go to the local and state library as a record of the day, but they would also like a copy to go into a time capsule. I have two issues to solve: 1. a storage medium capable of lasting 50 or 100 years and still be readable, and 2. a wrapper/codec that will be available and usable when the capsule is opened. I have the feeling that a conversion to film might be the only way to satisfy both requirements — it's easy enough to build a projector, or even re-scan the images for viewing. Has anyone got a viable alternative? Cloud storage isn't an option — this is going underground in a stainless steel container.
See also this similar question from 2008; how have the options changed in the meantime?